last executing test programs: 1.901201171s ago: executing program 2 (id=53): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) set_mempolicy_home_node(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030002100000002cbd7000fcdbdf2502000800080000001c0000000000000005000600000000000a0000000000000000000000000000000000000000000001020000000000000002000100000004d3f600070c0000000005000500000000000a"], 0x80}, 0x1, 0x7}, 0x0) 1.74887961s ago: executing program 2 (id=60): bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) r1 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002380)={r0, 0x0, 0x2d, 0x0, @val=@netfilter={0x2, 0x4, 0x600, 0x1}}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r1, 0x4) 1.659297715s ago: executing program 0 (id=63): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000002, 0x13, r0, 0x0) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000c00)=0xc, 0x6, 0x2) mlockall(0x7) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x6a0a4000) 1.578529849s ago: executing program 3 (id=65): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x97) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x0], 0x0, 0x0, 0x1, 0x1}}, 0x40) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x9) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x7, 0x2) 1.516185873s ago: executing program 3 (id=66): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x30004081) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg(r1, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a80)=""/20, 0x14}], 0x1}, 0x0) 1.452286447s ago: executing program 2 (id=67): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1000, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) timer_settime(r1, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000002000000) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000002000000) 1.322446944s ago: executing program 0 (id=68): socket$tipc(0x1e, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x76) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) kexec_load(0x0, 0x0, 0x0, 0x5) 1.21927909s ago: executing program 3 (id=69): sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000050a03000000000000000000020000000c00024000000000000000010900010073797a30000000002c000000030a01040000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x80}}, 0x0) close_range(r0, r1, 0x0) 1.192775502s ago: executing program 3 (id=70): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa82, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) io_setup(0x7, &(0x7f0000000280)=0x0) syz_clone(0x100411, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000b40)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x8655, r0, 0x0}]) 1.171080563s ago: executing program 4 (id=71): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) r3 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) open_tree(r4, &(0x7f0000000640)='\x00', 0x9801) close_range(r0, 0xffffffffffffffff, 0x0) 1.142914065s ago: executing program 0 (id=72): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000880)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x101}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, '\x00\x00'}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="40000000210a018800000000000000000a0000010900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0x40}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) 1.137360825s ago: executing program 4 (id=73): r0 = syz_io_uring_setup(0x10f, &(0x7f00000000c0)={0x0, 0x211a, 0x80, 0x4, 0x306}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000040)=0xffefffdc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x8, 0x1, 0xffffffffffffffff, 0x0}) io_uring_enter(r0, 0x3516, 0x7dd6, 0x8, 0x0, 0x0) 1.118835016s ago: executing program 0 (id=74): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x5) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000600)="5f0efc3e1792a50972d2eb21bdff9ca4ac804c2847689e7fd3f3fe7bf05ddc63ff512d4074687760a5fbd1fc97777a6e55123f04cc8437b15f4b2c6f5027dcea15b6658d", 0xffffff3d, 0x0, 0x0, 0xffffffffffffff10) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000700)=""/130, 0x82}], 0x1}, 0x10012) 1.093196327s ago: executing program 4 (id=75): r0 = socket$inet(0x2, 0x1, 0x100) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r1, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x7) listen(r0, 0x0) 1.070216958s ago: executing program 4 (id=76): r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x40000) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000000c0)=""/233, 0xe9}], 0x1}, 0x1ff}], 0x1, 0x30160, 0x0) 1.054985319s ago: executing program 4 (id=77): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1b459d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x1}, 0x6025, 0x4005, 0xb, 0x0, 0x5, 0x7, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000004000000000000000000000850000007a00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000ac0)="01", 0xfffffe9c}], 0x1}}], 0x2, 0x0) 989.970843ms ago: executing program 4 (id=78): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x220c000, &(0x7f0000000480), 0x1, 0x4c2, &(0x7f0000000a00)="$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") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000b80)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a54000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000c"], 0xe8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket(0x2, 0x80805, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xb, 0x5884, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x4000, 0x10000, 0x9, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x2, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x800810, &(0x7f0000000440)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@nogrpid}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x443, 0x146) truncate(&(0x7f0000000040)='./file1\x00', 0x100003) 906.896958ms ago: executing program 3 (id=79): openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xc4, 0x19, 0xfd3649826d894c67, 0x0, 0x0, {{@in6=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0xfffffffffffffffc}, {0x0, 0xacb0, 0x400000000}, 0x400, 0x6e6bc0, 0x0, 0x1}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xc4}}, 0x4c050) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x8810) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d0000100000002f3144a8edffffff03000600ff18000002004909000100000000000000001e0e080012000200010000d200000000000030006c540203009f7eae02000000adb20200000000f52c000000cdff00000001020014bb000001000000002300001300030005000020000002"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f00000000c0), 0x2c8, 0x0) 878.257309ms ago: executing program 3 (id=80): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x200, 0x100}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2$watch_queue(0x0, 0x80) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x28182, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="540000000206010200000000000000000500000005000100060000000d000300686173683a6e6574000000000900020073797a31000000000c00078008000640000000400500050002000000050004"], 0x54}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) 835.735502ms ago: executing program 1 (id=81): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0xb3}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 679.576261ms ago: executing program 1 (id=82): prctl$PR_GET_IO_FLUSHER(0x3a) open$dir(0x0, 0x0, 0x8) write$binfmt_format(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) prctl$PR_GET_IO_FLUSHER(0x3a) 644.999843ms ago: executing program 1 (id=83): r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x1, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0xc, &(0x7f00000000c0)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x400000, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_RT_PRIORITY={0x8, 0x9, 0x7ff}]}, 0x34}}, 0x0) 594.731866ms ago: executing program 1 (id=84): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="f8000000160001000000000000000000fe880000000000000000000000000001bf52864432ff010000010000000c7effca0018000000f2528ea07fc034d30000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fe880000000000000000000000000001000000006c"], 0xf8}, 0x1, 0x0, 0x0, 0x4004010}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c030000160001000000000000000000fc010000000000000000000000000000fe88000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac141400000000000000000000000000000000006c000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000025bd7000000000000000000000000000000000000300000006"], 0x34c}}, 0x0) 577.253647ms ago: executing program 2 (id=85): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) mknodat(r1, &(0x7f0000000100)='./file0/file0\x00', 0x8910, 0x4) getdents64(r0, &(0x7f0000000140)=""/56, 0x38) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400, 0x0) renameat2(r2, &(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000200)='./file7\x00', 0x0) getdents64(r0, 0x0, 0x0) 519.24434ms ago: executing program 2 (id=86): r0 = socket(0x2, 0x80805, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x383, @dev={0xfe, 0x80, '\x00', 0x3c}, 0x4}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7a, &(0x7f0000000340)={r2, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x2, 0x30, 0x7, 0x3}, &(0x7f0000000400)=0x18) 432.753635ms ago: executing program 2 (id=87): sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004002, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@usrquota}, {@data_err_ignore}, {@nobarrier}, {@oldalloc}, {@grpquota}, {@noload}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r2, &(0x7f00000001c0)="f1", 0x1) sendfile(r2, r0, 0x0, 0x40001) sendfile(r2, r1, 0x0, 0x7ffff000) 419.429916ms ago: executing program 1 (id=88): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) r0 = shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$SHM_UNLOCK(r0, 0xc) 332.148861ms ago: executing program 1 (id=89): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r1, &(0x7f0000000180), 0x13bb711e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 215.862588ms ago: executing program 0 (id=90): r0 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="09000000040000000400000007"], 0x48) r2 = fsmount(r0, 0x1, 0x0) fchdir(r2) r3 = open(&(0x7f0000000280)='.\x00', 0x800, 0x0) fcntl$notify(r3, 0x402, 0x8000001f) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) 0s ago: executing program 0 (id=91): r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r0, 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x40000100, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8b, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 14.357757][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 14.357774][ T29] audit: type=1400 audit(1769686637.606:57): avc: denied { transition } for pid=3184 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.361779][ T29] audit: type=1400 audit(1769686637.606:58): avc: denied { noatsecure } for pid=3184 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.364546][ T29] audit: type=1400 audit(1769686637.606:59): avc: denied { write } for pid=3184 comm="sh" path="pipe:[456]" dev="pipefs" ino=456 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.367713][ T29] audit: type=1400 audit(1769686637.606:60): avc: denied { rlimitinh } for pid=3184 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.370455][ T29] audit: type=1400 audit(1769686637.606:61): avc: denied { siginh } for pid=3184 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.560422][ T29] audit: type=1400 audit(1769686640.816:62): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.582416][ T29] audit: type=1400 audit(1769686640.816:63): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.604970][ T29] audit: type=1400 audit(1769686640.816:64): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.627824][ T29] audit: type=1400 audit(1769686640.816:65): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.650776][ T29] audit: type=1400 audit(1769686640.816:66): avc: denied { read open } for pid=3195 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.104' (ED25519) to the list of known hosts. [ 22.090746][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 22.090761][ T29] audit: type=1400 audit(1769686645.346:70): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.119873][ T29] audit: type=1400 audit(1769686645.366:71): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.120650][ T3296] cgroup: Unknown subsys name 'net' [ 22.147499][ T29] audit: type=1400 audit(1769686645.396:72): avc: denied { unmount } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.340799][ T3296] cgroup: Unknown subsys name 'cpuset' [ 22.346839][ T3296] cgroup: Unknown subsys name 'rlimit' [ 22.496673][ T29] audit: type=1400 audit(1769686645.746:73): avc: denied { setattr } for pid=3296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.522574][ T29] audit: type=1400 audit(1769686645.746:74): avc: denied { create } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.543018][ T29] audit: type=1400 audit(1769686645.746:75): avc: denied { write } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.555313][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.563364][ T29] audit: type=1400 audit(1769686645.746:76): avc: denied { read } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.592205][ T29] audit: type=1400 audit(1769686645.756:77): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.616956][ T29] audit: type=1400 audit(1769686645.756:78): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.640294][ T29] audit: type=1400 audit(1769686645.766:79): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 22.657800][ T3296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.720526][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 23.749710][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 23.806742][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 23.848536][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.855725][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.863175][ T3313] bridge_slave_0: entered allmulticast mode [ 23.869498][ T3313] bridge_slave_0: entered promiscuous mode [ 23.877980][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.885049][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.892399][ T3313] bridge_slave_1: entered allmulticast mode [ 23.898857][ T3313] bridge_slave_1: entered promiscuous mode [ 23.914089][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 23.926928][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.934082][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.941273][ T3312] bridge_slave_0: entered allmulticast mode [ 23.947623][ T3312] bridge_slave_0: entered promiscuous mode [ 23.956787][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.963939][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.971047][ T3312] bridge_slave_1: entered allmulticast mode [ 23.977350][ T3312] bridge_slave_1: entered promiscuous mode [ 23.984602][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.010057][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.030805][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.039993][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 24.062207][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.080995][ T3313] team0: Port device team_slave_0 added [ 24.086590][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.093747][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.100978][ T3317] bridge_slave_0: entered allmulticast mode [ 24.107330][ T3317] bridge_slave_0: entered promiscuous mode [ 24.117944][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.125049][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.132201][ T3317] bridge_slave_1: entered allmulticast mode [ 24.138504][ T3317] bridge_slave_1: entered promiscuous mode [ 24.158020][ T3313] team0: Port device team_slave_1 added [ 24.186528][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.193641][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.200913][ T3321] bridge_slave_0: entered allmulticast mode [ 24.207449][ T3321] bridge_slave_0: entered promiscuous mode [ 24.214378][ T3312] team0: Port device team_slave_0 added [ 24.224930][ T3312] team0: Port device team_slave_1 added [ 24.236672][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.243754][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.251060][ T3321] bridge_slave_1: entered allmulticast mode [ 24.257452][ T3321] bridge_slave_1: entered promiscuous mode [ 24.264872][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.284808][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.291802][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.317771][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.328782][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.335745][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.361719][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.373460][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.403316][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.416736][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.423726][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.450141][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.465849][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.472828][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.498894][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.523164][ T3317] team0: Port device team_slave_0 added [ 24.534175][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.543291][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.550420][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.557654][ T3320] bridge_slave_0: entered allmulticast mode [ 24.563887][ T3320] bridge_slave_0: entered promiscuous mode [ 24.575083][ T3317] team0: Port device team_slave_1 added [ 24.580725][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.588151][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.595350][ T3320] bridge_slave_1: entered allmulticast mode [ 24.601819][ T3320] bridge_slave_1: entered promiscuous mode [ 24.610409][ T3312] hsr_slave_0: entered promiscuous mode [ 24.616277][ T3312] hsr_slave_1: entered promiscuous mode [ 24.632777][ T3313] hsr_slave_0: entered promiscuous mode [ 24.638680][ T3313] hsr_slave_1: entered promiscuous mode [ 24.644549][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 24.650348][ T3313] Cannot create hsr debugfs directory [ 24.668161][ T3321] team0: Port device team_slave_0 added [ 24.674731][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.684656][ T3321] team0: Port device team_slave_1 added [ 24.695042][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.702207][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.728248][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.740198][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.770797][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.777743][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.803709][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.823095][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.830099][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.856004][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.877003][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.883990][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.909982][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.939212][ T3320] team0: Port device team_slave_0 added [ 24.958353][ T3321] hsr_slave_0: entered promiscuous mode [ 24.964597][ T3321] hsr_slave_1: entered promiscuous mode [ 24.970402][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 24.976123][ T3321] Cannot create hsr debugfs directory [ 24.984970][ T3320] team0: Port device team_slave_1 added [ 25.053005][ T3317] hsr_slave_0: entered promiscuous mode [ 25.058876][ T3317] hsr_slave_1: entered promiscuous mode [ 25.064868][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 25.070623][ T3317] Cannot create hsr debugfs directory [ 25.082984][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.089917][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.115981][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.127124][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.134099][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.160034][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.218093][ T3320] hsr_slave_0: entered promiscuous mode [ 25.224183][ T3320] hsr_slave_1: entered promiscuous mode [ 25.229955][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 25.235783][ T3320] Cannot create hsr debugfs directory [ 25.281294][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 25.292203][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 25.305438][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 25.316262][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 25.359012][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 25.377716][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 25.388525][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 25.397939][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 25.426766][ T3321] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 25.436940][ T3321] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 25.445704][ T3321] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 25.455438][ T3321] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 25.494069][ T3317] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 25.520456][ T3317] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 25.529539][ T3317] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 25.538165][ T3317] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 25.560354][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.584827][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.602316][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.614172][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 25.625487][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.633774][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.641998][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 25.651949][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.659068][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.670600][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 25.679187][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 25.693225][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.700354][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.708951][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.716033][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.734777][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.741858][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.758624][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.794931][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.802037][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.820259][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.827372][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.853087][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.867673][ T3321] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 25.878071][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.911238][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.919940][ T2058] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.927058][ T2058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.969837][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.976950][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.987409][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.997749][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.009696][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.027890][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.041400][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.053880][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.060957][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.088202][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.095297][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.112133][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.122740][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.224070][ T3312] veth0_vlan: entered promiscuous mode [ 26.238207][ T3313] veth0_vlan: entered promiscuous mode [ 26.249008][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.265256][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.282418][ T3313] veth1_vlan: entered promiscuous mode [ 26.291234][ T3312] veth1_vlan: entered promiscuous mode [ 26.334814][ T3312] veth0_macvtap: entered promiscuous mode [ 26.342314][ T3321] veth0_vlan: entered promiscuous mode [ 26.356938][ T3313] veth0_macvtap: entered promiscuous mode [ 26.364034][ T3312] veth1_macvtap: entered promiscuous mode [ 26.375999][ T3313] veth1_macvtap: entered promiscuous mode [ 26.387513][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.395497][ T3321] veth1_vlan: entered promiscuous mode [ 26.410810][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.419533][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.440113][ T319] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.455516][ T3321] veth0_macvtap: entered promiscuous mode [ 26.464468][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.474867][ T319] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.494781][ T319] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.504361][ T3321] veth1_macvtap: entered promiscuous mode [ 26.516018][ T319] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.535193][ T3317] veth0_vlan: entered promiscuous mode [ 26.541355][ T3320] veth0_vlan: entered promiscuous mode [ 26.546988][ T319] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.564141][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.572841][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.583186][ T3320] veth1_vlan: entered promiscuous mode [ 26.606126][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.614356][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.625428][ T3317] veth1_vlan: entered promiscuous mode [ 26.635041][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.651950][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.671445][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.693429][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.702841][ T3320] veth0_macvtap: entered promiscuous mode [ 26.715288][ T3320] veth1_macvtap: entered promiscuous mode [ 26.733586][ T3317] veth0_macvtap: entered promiscuous mode [ 26.743070][ T3485] loop1: detected capacity change from 0 to 164 [ 26.753839][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.764361][ T3485] Unable to read rock-ridge attributes [ 26.779282][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.794315][ T3317] veth1_macvtap: entered promiscuous mode [ 26.800288][ T3485] Unable to read rock-ridge attributes [ 26.834970][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.845068][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.863341][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.895243][ T3494] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 26.916891][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.942399][ T3494] loop3: detected capacity change from 0 to 136 [ 26.958918][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.991714][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.045685][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.060847][ T3498] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.067973][ T3498] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.102674][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.126597][ T31] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.164271][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 27.164286][ T29] audit: type=1400 audit(1769686650.416:126): avc: denied { create } for pid=3506 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.171287][ T31] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.233830][ T29] audit: type=1400 audit(1769686650.426:127): avc: denied { mounton } for pid=3506 comm="syz.4.5" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 27.240056][ T31] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.256396][ T29] audit: type=1400 audit(1769686650.446:128): avc: denied { watch } for pid=3504 comm="syz.2.3" path="/0" dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 27.256470][ T29] audit: type=1400 audit(1769686650.446:129): avc: denied { watch_reads } for pid=3504 comm="syz.2.3" path="/0" dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 27.308285][ T29] audit: type=1400 audit(1769686650.456:130): avc: denied { create } for pid=3510 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 27.321426][ T31] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.327604][ T29] audit: type=1400 audit(1769686650.466:131): avc: denied { setopt } for pid=3510 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 27.355614][ T29] audit: type=1400 audit(1769686650.466:132): avc: denied { connect } for pid=3510 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 27.375237][ T29] audit: type=1400 audit(1769686650.466:133): avc: denied { name_connect } for pid=3510 comm="syz.1.13" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 27.400917][ T3521] netlink: 24 bytes leftover after parsing attributes in process `syz.0.15'. [ 27.401009][ T29] audit: type=1400 audit(1769686650.536:134): avc: denied { read } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.428934][ T29] audit: type=1400 audit(1769686650.626:135): avc: denied { shutdown } for pid=3510 comm="syz.1.13" lport=35554 faddr=fc01:: fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 27.458792][ T3521] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15'. [ 27.764437][ T3548] capability: warning: `syz.3.27' uses deprecated v2 capabilities in a way that may be insecure [ 28.067929][ T3566] netlink: 24 bytes leftover after parsing attributes in process `syz.4.35'. [ 28.111962][ T3569] loop1: detected capacity change from 0 to 512 [ 28.120948][ T3569] EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem [ 28.123352][ C0] hrtimer: interrupt took 28236 ns [ 28.137584][ T3569] EXT4-fs (loop1): orphan cleanup on readonly fs [ 28.146811][ T3569] EXT4-fs (loop1): 1 truncate cleaned up [ 28.161175][ T3569] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 28.231721][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 28.367241][ T3578] netlink: 4 bytes leftover after parsing attributes in process `syz.0.39'. [ 28.465982][ T3584] veth2: entered promiscuous mode [ 28.471609][ T3584] veth2: entered allmulticast mode [ 28.646839][ T3603] Zero length message leads to an empty skb [ 29.435133][ T3660] serio: Serial port ptm0 [ 29.622228][ T3679] loop4: detected capacity change from 0 to 512 [ 29.646846][ T3679] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.659940][ T3679] ext4 filesystem being mounted at /11/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 29.674447][ T3679] netlink: 16 bytes leftover after parsing attributes in process `syz.4.78'. [ 29.707484][ T3679] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 29.763268][ T3679] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 29.821732][ T3679] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 29.821838][ T3688] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 29.835483][ T3679] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 29.901362][ T3688] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 29.977227][ T3679] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 30.031185][ T3696] netlink: 'syz.1.84': attribute type 29 has an invalid length. [ 30.063840][ T3696] netlink: 'syz.1.84': attribute type 29 has an invalid length. [ 30.083755][ T3688] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 30.110170][ T3696] netlink: 500 bytes leftover after parsing attributes in process `syz.1.84'. [ 30.119166][ T3696] unsupported nla_type 58 [ 30.144698][ T3679] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 30.196642][ T3702] loop2: detected capacity change from 0 to 1024 [ 30.214193][ T3688] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.78: corrupted xattr block 33: bad e_name length [ 30.229914][ T3702] ======================================================= [ 30.229914][ T3702] WARNING: The mand mount option has been deprecated and [ 30.229914][ T3702] and is ignored by this kernel. Remove the mand [ 30.229914][ T3702] option from the mount to silence this warning. [ 30.229914][ T3702] ======================================================= [ 30.304870][ T3702] EXT4-fs: Ignoring removed oldalloc option [ 30.311149][ T3702] EXT4-fs: Ignoring removed bh option [ 30.386627][ T3688] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 30.411438][ T3702] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.583293][ T3686] Set syz1 is full, maxelem 65536 reached [ 30.598048][ T3688] EXT4-fs error (device loop4): ext4_acquire_dquot:6986: comm syz.4.78: Failed to acquire dquot type 0 [ 30.624661][ T3702] ================================================================== [ 30.632783][ T3702] BUG: KCSAN: data-race in xas_find_marked / xas_set_mark [ 30.640005][ T3702] [ 30.642339][ T3702] write to 0xffff88811acc8b5c of 4 bytes by task 3713 on cpu 1: [ 30.649978][ T3702] xas_set_mark+0x12b/0x140 [ 30.654502][ T3702] __folio_start_writeback+0x17b/0x370 [ 30.659960][ T3702] ext4_bio_write_folio+0x5ad/0x9f0 [ 30.665162][ T3702] mpage_process_page_bufs+0x4a1/0x620 [ 30.670641][ T3702] mpage_prepare_extent_to_map+0x7d4/0xc50 [ 30.676441][ T3702] ext4_do_writepages+0x9f6/0x2800 [ 30.681560][ T3702] ext4_writepages+0x18f/0x320 [ 30.686328][ T3702] do_writepages+0x1c6/0x310 [ 30.690924][ T3702] file_write_and_wait_range+0x178/0x2f0 [ 30.696552][ T3702] generic_buffers_fsync_noflush+0x45/0x130 [ 30.702529][ T3702] ext4_sync_file+0x1aa/0x680 [ 30.707223][ T3702] vfs_fsync_range+0x10d/0x130 [ 30.711993][ T3702] ext4_buffered_write_iter+0x34f/0x3c0 [ 30.717639][ T3702] ext4_file_write_iter+0x380/0xf70 [ 30.722870][ T3702] iter_file_splice_write+0x6bc/0xa80 [ 30.728234][ T3702] direct_splice_actor+0x156/0x2a0 [ 30.733341][ T3702] splice_direct_to_actor+0x311/0x670 [ 30.738712][ T3702] do_splice_direct+0x119/0x1a0 [ 30.743556][ T3702] do_sendfile+0x382/0x650 [ 30.747972][ T3702] __x64_sys_sendfile64+0x105/0x150 [ 30.753166][ T3702] x64_sys_call+0x2db1/0x3000 [ 30.757852][ T3702] do_syscall_64+0xc0/0x2a0 [ 30.762356][ T3702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.768330][ T3702] [ 30.770647][ T3702] read to 0xffff88811acc8b5c of 4 bytes by task 3702 on cpu 0: [ 30.778187][ T3702] xas_find_marked+0x5d7/0x620 [ 30.782977][ T3702] filemap_get_folios_tag+0xfa/0x510 [ 30.788278][ T3702] mpage_prepare_extent_to_map+0x328/0xc50 [ 30.794085][ T3702] ext4_do_writepages+0x9f6/0x2800 [ 30.799200][ T3702] ext4_writepages+0x18f/0x320 [ 30.803960][ T3702] do_writepages+0x1c6/0x310 [ 30.808554][ T3702] file_write_and_wait_range+0x178/0x2f0 [ 30.814180][ T3702] generic_buffers_fsync_noflush+0x45/0x130 [ 30.820073][ T3702] ext4_sync_file+0x1aa/0x680 [ 30.824756][ T3702] vfs_fsync_range+0x10d/0x130 [ 30.829516][ T3702] ext4_buffered_write_iter+0x34f/0x3c0 [ 30.835065][ T3702] ext4_file_write_iter+0x380/0xf70 [ 30.840269][ T3702] iter_file_splice_write+0x6bc/0xa80 [ 30.845631][ T3702] direct_splice_actor+0x156/0x2a0 [ 30.850746][ T3702] splice_direct_to_actor+0x311/0x670 [ 30.856214][ T3702] do_splice_direct+0x119/0x1a0 [ 30.861064][ T3702] do_sendfile+0x382/0x650 [ 30.865484][ T3702] __x64_sys_sendfile64+0x105/0x150 [ 30.870684][ T3702] x64_sys_call+0x2db1/0x3000 [ 30.875363][ T3702] do_syscall_64+0xc0/0x2a0 [ 30.879870][ T3702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.885757][ T3702] [ 30.888067][ T3702] value changed: 0x0a000021 -> 0x04000021 [ 30.893941][ T3702] [ 30.896261][ T3702] Reported by Kernel Concurrency Sanitizer on: [ 30.902434][ T3702] CPU: 0 UID: 0 PID: 3702 Comm: syz.2.87 Not tainted syzkaller #0 PREEMPT(voluntary) [ 30.911975][ T3702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 30.922022][ T3702] ================================================================== [ 30.999355][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.091394][ T3702] syz.2.87 (3702) used greatest stack depth: 9176 bytes left [ 31.100406][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.